Schemers Use Pretexting and Vishing to Gather Passwords and Sensitive Data screenshot

Schemers Use Pretexting and Vishing to Gather Passwords and Sensitive Data

How difficult is it to trick someone into revealing sensitive data like passwords over phone calls, text messages, or emails? Sadly, it is easier than you might think as hackers employ phishing techniques like... Read more

September 3, 2020
3 Types of Complicated and Costly Email Threats That Organizations Should Watch Out For screenshot

3 Types of Complicated and Costly Email Threats That Organizations Should Watch Out For

It is estimated that $2.9 million is lost to cybercrime every single minute and that large companies are losing $25/minute on security breaches alone. These are shocking numbers, and it is likely that they will grow... Read more

September 3, 2020
10 Essential Security Settings in Smartphones You Should Use to Protect Yourself screenshot

10 Essential Security Settings in Smartphones You Should Use to Protect Yourself

When was the last time you reviewed your phone’s security settings? Do you get the impression that your mobile device is a lot safer to use than your computer? Well, cybercrime evolves just as fast as everything else... Read more

September 2, 2020
Only A Third of Data Breach Victims Change Their Passwords, New Study Finds screenshot

Only A Third of Data Breach Victims Change Their Passwords, New Study Finds

Constant worrying and stress do no good for the body, mind, and soul. That being said, some people might be too relaxed about the wrong things. Password security being one of them. Even when passwords are breached,... Read more

September 1, 2020
You Are Not Scammed by Real People. You Are Scammed by Bots screenshot

You Are Not Scammed by Real People. You Are Scammed by Bots

It seems like everyone is going through some type of fatigue that is directly or indirectly caused by the COVID-19 pandemic. That is, everyone but cybercriminals. It would be great if they were too stressed out to... Read more

August 31, 2020
If You Think 3sYqo15hiL is a Good Password, Think Again screenshot

If You Think 3sYqo15hiL is a Good Password, Think Again

Although security researchers are looking for ways to get rid of passwords, it does not look like that is happening any time soon. Passwords are and going to remain the core part of account security, and everyone must... Read more

August 28, 2020
Qbot's New Version Can Hijack Email Threads screenshot

Qbot's New Version Can Hijack Email Threads

The online threat landscape is a very peculiar place. It shifts and changes all the time, and we see new names come in while old ones drop out every single day. In light of all this, you might expect that a malware... Read more

August 28, 2020
5 Questions and Answers About What to Do After a Data Breach screenshot

5 Questions and Answers About What to Do After a Data Breach

Question 1: Did I experience a data breach? There are several types of data breaches. While some are targeted at large companies and organizations, others are conducted on a more personal level. A data breach that... Read more

August 27, 2020
Watch Out for the 'Fix Incoming Email Issues' Email Aimed at Outlook Users screenshot

Watch Out for the 'Fix Incoming Email Issues' Email Aimed at Outlook Users

Unfortunately, emails that try to trick you into giving away your login credentials have become so common, that they are now a part of our everyday online existence. Most of these campaigns are not incredibly... Read more

August 27, 2020
How to Easily Transfer Files Between Mac and Windows screenshot

How to Easily Transfer Files Between Mac and Windows

Here's a task that, on the face of it at least, should be very simple. You have a Windows PC and a Mac, and you need to transfer files from one of the devices to the other. How do you go about doing it? It looks like... Read more

August 26, 2020
4 Things That Help Hackers Perform Successful Cyber Attacks screenshot

4 Things That Help Hackers Perform Successful Cyber Attacks

While COVID-19 has disrupted the lives of many, the chaos that the pandemic has brought created various opportunities for cybercriminals. In other words, cyber attacks are on the rise, which is why you should care... Read more

August 26, 2020
Before You Start Using Facebook's Messenger Rooms, Consider Your Account's Security screenshot

Before You Start Using Facebook's Messenger Rooms, Consider Your Account's Security

Applications with video-conferencing functionality are on the rise as many people stay at home due to the COVID-19 pandemic. Such tools allow users to work from home as well as stay connected with their friends and... Read more

August 26, 2020
1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 165